1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlada [557]
2 years ago
5

The decision in an if statement is referred to as a

Computers and Technology
2 answers:
sp2606 [1]2 years ago
6 0
Selection bc badabingbadaboom POW
damaskus [11]2 years ago
5 0
A selection because when you decide something you select
You might be interested in
The RAM memory of a computer contains the volatile memory, which includes
lara31 [8.8K]

The RAM memory of a computer contains the volatile memory, which includes; Websites recently visited

<h3>Random Access Memory(RAM)</h3>

Random access memory (RAM) is defined as a computer's short-term memory that it utilizes to handle all active tasks and applications.

Now, no single program, file, game, or stream would work without a RAM. Thus, RAM is a temporary storage that goes away when we shut down the computer.

Examples of things that RAM store from the options given is only websites visited recently.

Read more about Random Access Memory at; brainly.com/question/86807

3 0
3 years ago
Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling,
Fittoniya [83]

Answer:

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center <u>aggregation</u> layer.

Explanation:

Consider the given information.

A key point for security and application services is the aggregation layer. In the data centre aggregation layer, the Layer 4 security and application services provide server load balancing, SSL offloading, firewalling, and IPS services.

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center <u>aggregation</u> layer.

7 0
3 years ago
If I gain a rank and go under the points that the rank coust do I lose the rank
padilas [110]
This is a good question, and I've wondered about that myself. I'm going to 'report' the question, not because there's anything wrong with it, but to bring it to the attention of the Moderators, so they can tell both of us.
4 0
3 years ago
Read 2 more answers
What would you enter at the command prompt on a Linux system to display the IP addressesand the subnet masks assigned to each ne
noname [10]

Answer:

The ifconfig command.

Explanation:

A linux network system, like cisco networking devices, uses the linux operating system, in which it configuration differs from that of the cisco. It is very essential in network administration of have the basics in linux systems.

The network administrator uses the "ifconfig" command to display the IP addresses and subnet masks assigned to each network interface on a linux system.

5 0
3 years ago
There are many advantages and some disadvantages to using social media. Explain at least one of the advantages to
OverLord2011 [107]

Answer:  yes

Explanation:social media has the advantage of long distance communication and a disadvantage is cyber bullying and yes i thank if most people where nice long social media is good  

3 0
3 years ago
Other questions:
  • The Internet may best be compared to a/an
    8·1 answer
  • How do i get around goguardian from a chromebook
    14·1 answer
  • Optimizing a network to handle more traffic by adding new specialized software is an example of ______ scaling. Adding additiona
    9·1 answer
  • When describing memory, ____________ is the first component required in the process necessary for retention?
    10·1 answer
  • A shortage of blood for transfusions for injured animals has resulted in the introduction of a synthesized product called Oxyglo
    15·1 answer
  • An HTML document is composed of ______ that represent distinct items in the Web Page, such as a paragraph, the page heading, or
    9·1 answer
  • When hacking a website to test a secure connection and ensure internet safety, what is a good way to check the coding of the web
    14·1 answer
  • What types of printed information are useful to obtain from your target employers?
    5·1 answer
  • 1. How many column can you insert in a MS Word in maximum?
    11·1 answer
  • Write a static method that implements a recursive formula for factorials. Place this method in a test program that allows the us
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!